I travel a lot for my company and have been doing some work in third-world countries lately. I've been using the Internet at different Internet cafes and I'm worried about if anyone could have stolen my password or listen to my keystrokes.
I've heard one way to get around that would be to write part of your password at different times (AKA type the first part of my password, then random letters, delete those letters and finally finish your password). Does this actually work? What are some other things I can do security wise?

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States.
Privacy

Processing your response...

Discuss This Question: 1 &nbspReply

There was an error processing your information. Please try again later.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States.
Privacy

I definitely wouldn't use your common passwords on risky networks/systems. Would definitely change them often via a trusted means if possible.

An ideal thing to do, if possible, is to create dedicated accounts for each visit so you don't expose your main (long-term) accounts.

The backspace method seems like a good idea. I suspect that if malware that monitors keystrokes is smart enough it will track those backspaces. If anything, you still might eventually give someone a leg up on cracking your passwords.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States.
Privacy

Processing your reply...

Ask a Question

Free Guide: Managing storage for virtual environments

Complete a brief survey to get a complimentary 70-page whitepaper featuring the best methods and solutions for your virtual environment, as well as hypervisor-specific management advice from TechTarget experts. Don’t miss out on this exclusive content!

Share this item with your network:

To follow this tag...

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States.
Privacy